The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many pathogenic mutations percolate to protein dysfunction by altering dynamics. Reconstructing protein energy landscapes promises to relate dynamics to function but is generally infeasible due to the disparate spatio-temporal scales involved. Recent algorithmic innovation allows reconstructing energy landscapes of medium-size proteins in the presence of sufficient prior wet-laboratory structure data...
Interactions among proteins are important mechanisms in living cells. The whole set of interactions is often referred to as a protein-protein interaction network (PIN). Comparison among such networks may discover conserved (or disrupted) patterns of interactions among species. Such comparison is performed using network alignment algorithms. They help analyse PPI networks for a better understanding...
Order-batching is a common practice in orderpicking» which can reduce the total picking time if the orders have many relevant in Multi-Shuttle Warehouse System. In this paper, the performance of different order-batching methods that are made up of one seed-order selection rule and one accompanying-order selection rule is investigated. A seed-order selection rule selects the first order (i.e. the seed...
The report considers the modified Peters algorithm to calculate the Hurst exponent (HE), the essential properties of HE are proved, an example, analysis of a random time series is given.
In this paper we consider the problem of identifying intersections between two sets of d-dimensional axis-parallel rectangles. This is a common operation that arises in many agent-based simulation studies, and is of central importance in the context of High Level Architecture (HLA), where it is at the core of the Data Distribution Management (DDM) service. Several realizations of the DDM service have...
Due to increasing volume of data in information technology, saving storage space and providing security to data has acquired more attention and popularity. In data processing and data mining, duplicates can effect severely. Data deduplication is a technique that eliminates duplicate data and store only one copy, promoting single instance storage. The main challenges are to identify maximum duplicate...
Word wide web is considered as the most important information store in recent years. Web development expands to a great extent with new technologies. Search engines are ineffective when the number of docs in the web is multiplied. In the same way, the retrieval of queries, most of which are not related to what the user was looking for. The documents are of varied and flexible web, there are tough...
This scientific paper contains the analysis of common MPPT algorithms and usual data processing algorithms for the purpose of the power optimization of mobile solar generators. Furthermore according to the analysis results, an optimized MPPT algorithm, the Global High-Dynamic MPPT algorithm, is designed. The design process approaches, and superordinate algorithm theoretical principles are described.
The Maximal Independent Set (MIS) graph problem arises in many applications such as computer vision, information theory, molecular biology, and process scheduling. The growing scale of MIS problems suggests the use of distributed-memory hardware as a cost-effective approach to providing necessary compute and memory resources. Luby proposed four randomized algorithms to solve the MIS problem. All those...
Swarm Robotics (SR) is expected to have a significant impact on society over the next decade. One of the contributing factors is that swarms are robust. However, robustness has not gained sufficient attention in the context of robotic swarms. This study focuses on the swarm network to generate insights as to how network topologies can be controlled to improve the robustness of SR systems. More specifically,...
Automatic text summarization is the task of deriving a meaningful and concise brief from a given text while retaining the concept and key information conveyed by the original text. So far, numerous approaches and algorithms have been devised to achieve this goal with certain accuracy and effectiveness. One key aspect of text summarization is accurate identification of keywords from the given textual...
Community detection is a critical task for complex network analysis. It helps us to understand the properties of the system that a complex network represents and has significance to a wide range of applications. Nowadays, the challenges faced by community detection algorithms include overlapping community structure detection, large scale network analysis, dynamic changing of analyzed network topology...
This paper considers the problem of joint channel allocation and power control in the uplink scenario of device-to-device communications underlaying cellular networks. The problem is formulated as a coalition formation game, then a merge-split algorithm for that game is investigated. We analyze the conditions for which an merge-split algorithm will always converge to the Dc-stable coalitional structure...
In this paper, we propose an approach to select top-k cloud services. Our approach combines the trust, determined by the reputation of the provider, and the QoS. We present different algorithms for processing such selection queries and evaluate them through a set of experiments.
We describe a method for formally representing the behaviour of complex processes by process windows. Each window covers a part of the system behaviour, i.e. a part of the underlying transition system, and is easier to understand and analyse than the complete transition system. Process windows can overlap and have shared states and transitions so that the complete system behaviour is the union of...
The proposed algorithm presents a solution to improve the grey wolf optimizer performance using weighted distance and immigration operation. The weight distance is used for the omega wolves movement is defined from fitness value of each leader (alpha, beta and delta). The traditional grey wolf algorithm has only one pack and has opportunity to trap in local optimum so the wolves in our proposed algorithm...
The problem of operating a Gaussian Half-Duplex (HD) relay network optimally is challenging due to the exponential number of listen/transmit network states that need to be considered. Recent results have shown that, for the class of Gaussian HD networks with N relays, there always exists a simple schedule, i.e., with at most N+1 active states, that is sufficient for approximate (i.e., up to a constant...
SEAS Shared Intelligence (SEAS SI) is a platform for algorithms sharing and execution developed under the scope of Smart Energy Aware Systems (SEAS) project to promote the intelligent management of smart grids and microgrids, by means of the shared usage of algorithms and tools, while ensuring code and intellectual protection. In this paper the platform goals and architecture are described, focusing...
This paper presents a method for identification of fuzzy classifiers by means of data analysis. The method is based on the assumption that the data of the same classes form compact regions (clusters) in the input space. The algorithms for structure generation and parameter optimization of the fuzzy classifiers are proposed.
Server consolidation is the hosting of multiple tenantson a server machine. Given a sequence of data analyticstenant loads defined by the amount of resources that thetenants require and a service-level agreement (SLA) between thecustomer and the cloud service provider, significant cost savingscan be achieved by consolidating multiple tenants. Since servermachines can fail causing their tenants to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.